× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 099a57328de9335c524f44514e225d50731c808145221affdd684d8b4dad5a1d
File name: com.parental.control.v4.apk
Detection ratio: 38 / 60
Analysis date: 2017-09-26 01:55:21 UTC ( 3 weeks, 4 days ago )
Antivirus Result Update
AegisLab SUSPICIOUS 20170926
AhnLab-V3 Android-Trojan/FakeInst.60a0 20170926
Alibaba A.H.Pri.FakeAdobe.A 20170911
Antiy-AVL Trojan[Backdoor]/Android.Dingwe 20170925
Arcabit Android.Trojan.Dendroid.A 20170926
Avast Android:Dendroid-C [Trj] 20170926
Avast-Mobile APK:RepMalware [Trj] 20170925
AVG Android:Dendroid-C [Trj] 20170926
Baidu Android.Backdoor.Dingwe.g 20170922
BitDefender Android.Trojan.Dendroid.A 20170926
CAT-QuickHeal Android.Dingwe.A 20170925
ClamAV Andr.Malware.Agent-1534052 20170926
Comodo UnclassifiedMalware 20170926
Cyren AndroidOS/GenBl.DB01F96D!Olympus 20170926
DrWeb Android.Dendroid.1.origin 20170926
Emsisoft Android.Trojan.Dendroid.A (B) 20170926
ESET-NOD32 a variant of Android/Dingwe.A 20170926
F-Secure Backdoor:Android/Dendroid.A 20170926
Fortinet Android/Dendroid.A!tr.spy 20170926
GData Android.Trojan.Dendroid.A 20170926
Ikarus Trojan.AndroidOS.Dingwe 20170925
K7AntiVirus Trojan ( 0001140e1 ) 20170925
K7GW Trojan ( 0001140e1 ) 20170926
Kaspersky HEUR:Backdoor.AndroidOS.Dingwe.a 20170926
Kingsoft Android.Troj.FakeInst.yj.(kcloud) 20170926
MAX malware (ai score=100) 20170926
McAfee Artemis!DB01F96D5E66 20170926
NANO-Antivirus Trojan.Android.Banker.dxshbq 20170926
Qihoo-360 Trojan.Android.Gen 20170926
Sophos AV Andr/FakeInst-V 20170925
Symantec Android.Dendoroid 20170925
Symantec Mobile Insight Spyware:MobileSpy 20170926
Tencent Backdoor.Android.Dingwe.a 20170926
TrendMicro-HouseCall Suspicious_GEN.F47V0923 20170926
Trustlook Android.Malware.Trojan 20170926
WhiteArmor Malware.HighConfidence 20170829
ZoneAlarm by Check Point HEUR:Backdoor.AndroidOS.Dingwe.a 20170926
Zoner Trojan.AndroidOS.FakeApp.B 20170926
Ad-Aware 20170926
Avira (no cloud) 20170926
CMC 20170920
CrowdStrike Falcon (ML) 20170804
Cylance 20170926
Endgame 20170821
F-Prot 20170926
Sophos ML 20170914
Jiangmin 20170926
Malwarebytes 20170926
McAfee-GW-Edition 20170926
Microsoft 20170925
eScan 20170926
nProtect 20170926
Palo Alto Networks (Known Signatures) 20170926
Panda 20170925
Rising 20170926
SentinelOne (Static ML) 20170806
SUPERAntiSpyware 20170926
TheHacker 20170925
TotalDefense 20170925
TrendMicro 20170926
VBA32 20170925
VIPRE 20170926
ViRobot 20170925
Webroot 20170926
Yandex 20170908
Zillya 20170922
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.parental.control.v4. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.INTERNET (full Internet access)
android.permission.RECORD_AUDIO (record audio)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.android.browser.permission.READ_HISTORY_BOOKMARKS (read Browser's history and bookmarks)
android.permission.READ_SMS (read SMS or MMS)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.GET_ACCOUNTS (discover known accounts)
android.permission.RECEIVE_SMS (receive SMS)
Activities
com.connect.Dendroid
com.connect.Dialog
com.connect.CaptureCameraImage
com.connect.CameraView
com.connect.VideoView
Services
com.connect.MyService
com.connect.RecordService
Receivers
com.connect.ServiceReceiver
Activity-related intent filters
com.connect.Dendroid
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.connect.ServiceReceiver
actions: android.provider.Telephony.SMS_RECEIVED, android.intent.action.BOOT_COMPLETED, android.intent.action.PHONE_STATE, android.intent.action.ACTION_EXTERNAL_APPLICATIONS_AVAILABLE
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
15
Uncompressed size
1516544
Highest datetime
2013-11-30 12:13:54
Lowest datetime
2013-10-26 01:31:36
Contained files by extension
xml
5
png
4
dex
1
MF
1
jar
1
RSA
1
SF
1
Contained files by type
XML
5
unknown
4
PNG
4
DEX
1
ZIP
1
File identification
MD5 db01f96d5e66d82f7eb61b85eb96ef6e
SHA1 9c3844d7a798d913ea6310e5fd94c4a0f65387c6
SHA256 099a57328de9335c524f44514e225d50731c808145221affdd684d8b4dad5a1d
ssdeep
24576:ZJJwwjBVOiEgOeuboJRXV+ZOeZOdZO2ZO96x55:ZJVNM7gLuKPxH

File size 920.7 KB ( 942846 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk checks-gps android

VirusTotal metadata
First submission 2013-12-20 21:13:14 UTC ( 3 years, 10 months ago )
Last submission 2017-09-23 08:04:30 UTC ( 4 weeks ago )
File names com.parental.control.v4.apk
db01f96d5e66d82f7eb61b85eb96ef6e.apk
099A57328DE9335C524F44514E225D50731C808145221AFFDD684D8B4DAD5A1D
N1.apk
com.parental.control.v4.apk
M12.apk
com.parental.control.v4.apk
com.parental.control.v4_1.0.apk
vti-rescan
base.apk
N1.apk
099a57328de9335c524f44514e225d50731c808145221affdd684d8b4dad5a1d
com.parental.control.v4.apk
db01f96d5e66d82f7eb61b85eb96ef6e.apk
0372.apk
N2.apk
com.parental.control.v4.apk
db01f96d5e66d82f7eb61b85eb96ef6e.virus
099A57328DE9335C524F44514E225D50731C808145221AFFDD684D8B4DAD5A1D.apk
com.parental.control.v4
J31.apk
com.parental.control.v4.apk
099a57328de9335c524f44514e225d50731c808145221affdd684d8b4dad5a1d.log
com.parental.control.v4.apk
099A57328DE9335C524F44514E225D50
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/mnt/sdcard
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that provide access to the system location services. These services allow applications to obtain periodic updates of the device's geographical location, or to fire an application-specified Intent when the device enters the proximity of a given geographical location.
Contacted URLs
http://pizzachip.com/rat/get.php/UID=a58f550ad754904d&Provider=Android&Phone_Number=15555215554&Coordinates=null,null&Device=NexusS&Sdk=15&Version=1&Random=562&Password=keylimepie
http://pizzachip.com/rat/get.php/UID=a58f550ad754904d&Provider=Android&Phone_Number=15555215554&Coordinates=null,null&Device=NexusS&Sdk=15&Version=1&Random=325&Password=keylimepie
http://pizzachip.com/rat/get.php/UID=a58f550ad754904d&Provider=Android&Phone_Number=15555215554&Coordinates=null,null&Device=NexusS&Sdk=15&Version=1&Random=357&Password=keylimepie
http://pizzachip.com/rat
http://pizzachip.com/rat/get-functions.php?UID=a58f550ad754904d&Password=keylimepie